Security

Security | News, how-tos, features, reviews, and videos

Three businessmen - see no evil, hear no evil, speak no evil. [Thinkstock]
United States one-cent coin / penny / binary code

easy simple pixel hand computer pointer

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...

Insider threats  >  Employees suspiciously peering over cubicle walls

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.

browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.

Red team  >  Hackers coordinate an attack.

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how.

Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further...

Blackout, New York City skyline

Combatting extreme weather and power outages, a growing need for AI

The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change,...

partnership / teamwork / handshake

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

tt19 054 thumb
video

Printers: The overlooked security threat in your enterprise | TECHtalk

Printers, often a forgotten target in the enterprise, are vulnerable to all the usual cyberattacks. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp and CSO Online’s J.M. Porup discuss the threats to these devices, plus...

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 9 tools

There are plenty of antivirus tools for Android. Here's how the top nine measure up in protection, usability and features.

software development / application testing / tools in hand amid abstract code mapping

Top SAST and DAST tools that can fix app security problems before deployment

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

Defenders can discover phishing sites through web analytics IDs

Many phishing websites are now using unique user IDs (UIDs), and that gives defenders a signal to detect phishing attacks before they do much damage.

development / collaboration / teamwork

What CIOs want from CISOs: Collaboration and no finger pointing

Two CIOs explain how they view their relationships with the security function, and why CISOs need to collaborate closely with CIOs whether they report into them or not.

youtube thumbnails template
video

Boeing's insecure networks threaten security and safety

Aircraft manufacturer Boeing's insecure networks leave the company--and potentially its aircraft--at risk of exploitation. Security researcher Chris Kubecka uncovered these threats in April, and new reporting by CSO's J.M. Porup...

neon skull sign / danger / caution / threat

The 24/7 insider threat – Managing risk in a changing environment

A new model for managing insider risk in the "always-on” and “on-demand” workplace.

supply chain / virtual network of connections

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important.

Fragmented image of a Boeing 787 airplane represented in encrypted data.

Boeing's poor information security posture threatens passenger safety, national security, researcher says

The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees.

online certification mortar board graduate student study certificate  by pettycon pixabay and janjf

Earn your IoT security certification

Insider Pro is teaming up with CertNexus to offer subscribers access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.

Load More